Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Johannesburg

Region: Gauteng

Country: South Africa

Internet Service Provider: Telkom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 165.165.39.218
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56183
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;165.165.39.218.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062700 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 27 20:56:36 CST 2025
;; MSG SIZE  rcvd: 107
Host info
218.39.165.165.in-addr.arpa domain name pointer rrba-akamai-218.telkom-ipnet.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
218.39.165.165.in-addr.arpa	name = rrba-akamai-218.telkom-ipnet.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
116.7.176.146 attackbots
Oct  6 07:04:59 site3 sshd\[56870\]: Invalid user Einstein2017 from 116.7.176.146
Oct  6 07:04:59 site3 sshd\[56870\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.7.176.146
Oct  6 07:05:00 site3 sshd\[56870\]: Failed password for invalid user Einstein2017 from 116.7.176.146 port 60310 ssh2
Oct  6 07:09:17 site3 sshd\[56997\]: Invalid user Space123 from 116.7.176.146
Oct  6 07:09:17 site3 sshd\[56997\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.7.176.146
...
2019-10-06 14:18:54
45.55.187.39 attackspam
Oct  6 05:28:16 venus sshd\[20968\]: Invalid user India@123 from 45.55.187.39 port 39624
Oct  6 05:28:16 venus sshd\[20968\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.187.39
Oct  6 05:28:19 venus sshd\[20968\]: Failed password for invalid user India@123 from 45.55.187.39 port 39624 ssh2
...
2019-10-06 14:17:21
45.80.64.222 attackspambots
Oct  6 05:05:50 thevastnessof sshd[17216]: Failed password for root from 45.80.64.222 port 40492 ssh2
...
2019-10-06 14:27:59
213.32.69.98 attackspam
Oct  6 05:37:29 sshgateway sshd\[1802\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.69.98  user=root
Oct  6 05:37:31 sshgateway sshd\[1802\]: Failed password for root from 213.32.69.98 port 56824 ssh2
Oct  6 05:42:26 sshgateway sshd\[1828\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.69.98  user=root
2019-10-06 13:56:42
97.107.143.54 attack
2019-10-06T00:48:42.2553981495-001 sshd\[28608\]: Failed password for invalid user 6yhn5tgb4rfv from 97.107.143.54 port 41006 ssh2
2019-10-06T01:21:34.6463751495-001 sshd\[30824\]: Invalid user Germany@2017 from 97.107.143.54 port 37878
2019-10-06T01:21:34.6495831495-001 sshd\[30824\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=97.107.143.54
2019-10-06T01:21:36.6334041495-001 sshd\[30824\]: Failed password for invalid user Germany@2017 from 97.107.143.54 port 37878 ssh2
2019-10-06T01:25:13.2615081495-001 sshd\[31053\]: Invalid user Haslo_!@\# from 97.107.143.54 port 50082
2019-10-06T01:25:13.2709461495-001 sshd\[31053\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=97.107.143.54
...
2019-10-06 14:18:04
103.224.242.251 attack
19/10/5@23:52:43: FAIL: Alarm-Intrusion address from=103.224.242.251
...
2019-10-06 14:05:52
78.175.106.117 attack
scan z
2019-10-06 14:23:39
222.186.169.192 attack
19/10/6@01:48:22: FAIL: IoT-SSH address from=222.186.169.192
...
2019-10-06 13:57:23
222.186.30.165 attack
Oct  6 08:14:38 herz-der-gamer sshd[23713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.165  user=root
Oct  6 08:14:40 herz-der-gamer sshd[23713]: Failed password for root from 222.186.30.165 port 58408 ssh2
Oct  6 08:14:42 herz-der-gamer sshd[23713]: Failed password for root from 222.186.30.165 port 58408 ssh2
...
2019-10-06 14:20:29
134.175.39.246 attack
Oct  5 20:15:09 sachi sshd\[26927\]: Invalid user Santos@2017 from 134.175.39.246
Oct  5 20:15:09 sachi sshd\[26927\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.39.246
Oct  5 20:15:10 sachi sshd\[26927\]: Failed password for invalid user Santos@2017 from 134.175.39.246 port 32844 ssh2
Oct  5 20:20:25 sachi sshd\[27410\]: Invalid user 123Antonio from 134.175.39.246
Oct  5 20:20:25 sachi sshd\[27410\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.39.246
2019-10-06 14:28:52
206.189.167.53 attackspambots
2019-10-06T12:07:44.656867enmeeting.mahidol.ac.th sshd\[11234\]: Invalid user mc from 206.189.167.53 port 35778
2019-10-06T12:07:44.677429enmeeting.mahidol.ac.th sshd\[11234\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.167.53
2019-10-06T12:07:46.716553enmeeting.mahidol.ac.th sshd\[11234\]: Failed password for invalid user mc from 206.189.167.53 port 35778 ssh2
...
2019-10-06 13:59:07
120.132.106.195 attackspambots
Oct  6 01:57:03 xtremcommunity sshd\[224263\]: Invalid user Haslo12 from 120.132.106.195 port 42214
Oct  6 01:57:03 xtremcommunity sshd\[224263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.106.195
Oct  6 01:57:05 xtremcommunity sshd\[224263\]: Failed password for invalid user Haslo12 from 120.132.106.195 port 42214 ssh2
Oct  6 02:01:27 xtremcommunity sshd\[224320\]: Invalid user Disk123 from 120.132.106.195 port 45514
Oct  6 02:01:27 xtremcommunity sshd\[224320\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.106.195
...
2019-10-06 14:12:07
192.99.36.76 attackspam
2019-10-06T06:55:53.232977  sshd[19514]: Invalid user 1z2x3c from 192.99.36.76 port 46918
2019-10-06T06:55:53.245628  sshd[19514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.36.76
2019-10-06T06:55:53.232977  sshd[19514]: Invalid user 1z2x3c from 192.99.36.76 port 46918
2019-10-06T06:55:54.677608  sshd[19514]: Failed password for invalid user 1z2x3c from 192.99.36.76 port 46918 ssh2
2019-10-06T06:59:43.527153  sshd[19548]: Invalid user Poker2017 from 192.99.36.76 port 58270
...
2019-10-06 14:04:12
103.218.3.92 attackbots
Oct  6 05:35:29 web8 sshd\[18388\]: Invalid user Motdepasse!@\#123 from 103.218.3.92
Oct  6 05:35:29 web8 sshd\[18388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.218.3.92
Oct  6 05:35:32 web8 sshd\[18388\]: Failed password for invalid user Motdepasse!@\#123 from 103.218.3.92 port 40855 ssh2
Oct  6 05:39:18 web8 sshd\[20187\]: Invalid user Boutique123 from 103.218.3.92
Oct  6 05:39:18 web8 sshd\[20187\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.218.3.92
2019-10-06 14:11:34
58.56.9.5 attack
Oct  6 01:34:34 ny01 sshd[11657]: Failed password for root from 58.56.9.5 port 49324 ssh2
Oct  6 01:39:23 ny01 sshd[12497]: Failed password for root from 58.56.9.5 port 58292 ssh2
2019-10-06 14:09:52

Recently Reported IPs

163.0.167.255 163.77.168.168 162.37.152.172 163.203.186.147
162.207.111.176 155.26.228.48 157.81.214.226 154.192.136.227
154.113.174.80 153.79.11.153 155.242.0.186 15.48.228.142
150.139.206.54 15.22.245.131 15.69.144.158 144.71.193.199
146.15.183.141 140.34.59.145 149.121.246.227 142.82.65.40